SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 156
Paper Publications
Fingerprint Feature Extraction, Identification
and Authentication: A Review
1
Farah Fayaz Quraishi, 2
Summera Ashraf, 3
Dr. Manzoor Ahmad Chachoo
1, 2, 3
Department of Computer Science, University of Kashmir, Srinagar, Kashmir -190006, India
Abstract: In the modern computerized world, due to high demand on fingerprint identification system, a lot of
challenges keep arising in each phase of system, which include fingerprint image enhancement, feature extraction,
features matching and fingerprint classification. Applications such as online banking and online shopping use
techniques that depend on personal identification numbers, keys, or passwords. But there is the risk of data being
forgotten, lost, or even stolen. One of the solutions to it may be biometric authentication methods which provide a
unique way to identify, recognize and authenticate people. Fingerprints being the oldest methods of biometric
authentication, are being explored at large. The main focus of the paper is to review fingerprint feature extraction,
identification and authentication in different image/pattern based and minutiae-based fingerprints.
Keywords: Fingerprints, identification, feature extraction, authentication, AFIS.
1. INTRODUCTION
Fingerprint identification, also referred as “DACTYLOSCOPY”, is the method of verifying the fingerprints by comparing
two instances of minutiae which can be extracted from human fingers, toes, or even the palm of the hand or sole of the
foot. Fingerprint is one of the most researched and matured field of biometric authentication. The first known example of
biometrics in practice was a form of fingerprinting being used in China (Joao De Barros, 2005).
Fingerprints offer a flawless and reliable means of personal identification, thereby, replacing other methods of
establishing identities and authentication. The science of fingerprint identification and authentication outshines all other
forensic sciences on the following grounds (E. Spinella, 2002):
1) Fingerprint details are permanent. Other visible human characteristics tend to change – fingerprints don’t. Although
with age as the skin loses elasticity, fingerprints seem to be changed.
2) No two fingerprints have been ever found alike in many billions of humans and automated computer comparisons,
although individuality has been recently challenged in many court cases. According to the empirical study, two
individuals will not have more than seven common minutiae (E. Spinella, 2002, Maio and D. Maltoni)
Fingerprint Features Usually Considered:
1) Coarse Features: also known by the name of singular-points, are suited during an identification for presorting in a very
large database and include:
 Arch: These ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of
finger.
 Loop: The ridges enter from one side of a finger, form a curve, and then exit on the same side.
 Whorl: Ridges form circularly around a central point on the finger.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 157
Paper Publications
2) Fine Features: The major minutia features of fingerprint ridges are:
 Ridge Ending: point at which ridge terminates.
 Bifurcation: point at which single ridge splits into two ridges.
 Short Ridge (Or Dot): are ridges which are significantly shorter than the average ridge length on fingerprint.
 Core-Point: is the top-most point on the inner most ridge.
 Delta-Point: is the tri-radial point with three ridges radiating.
To identify and authenticate fingerprints, two steps are involved: Classification and Matching. Classification is the
method of grouping fingerprints into a few types based on a criteria while fingerprint matching is a method that uses some
sort of algorithm to assign the fingerprint to a particular person it belongs to, that is found in the database..
2. BACKGROUND
Fingerprints are constant, unique and form the most reliable criteria for identification (Pillay, 2009; Kanchan, T.
Chattopadhyay, S., 2006). It has been shown that fingerprints provide high accuracy when compared with other existing
biometric traits (A.K. Jain, P. Flynn, & A.A Ross; 2007). They are persistent in nature as they don’t easily change with
age, unlike face and voice patterns. Fingerprints are incomparably the most sure and unchanging form of all other forms
of signature (Francis Galton, 1892). According to Dario Maio and Davide Maltoni, “fingerprints are defined by a set of
ridge lines and they can run parallel, can terminate sometimes or can even intersect each other and the points where the
ridge lines are terminated, are known as Minutiae (D.Maio and D.Maltoni, 1997).” According to Galton, “each ridge is
characterized by numerous minute peculiarities called Minutiae, which may divide and almost immediately reunite,
enclosing a small circular or elliptical space or sometimes the independent beginning or ending of ridges (Francis Galton,
1892)”. In a fingerprint image, ridges are dark whereas valleys are bright. Ridges and valleys often run in parallel;
sometimes they bifurcate and sometimes they terminate. A good quality fingerprint contains 25-80 numbers of minutiae
(Neil Yager and Adnan Amin, 2004) which depend on the resolution and finger placement on the sensor. However, the
fingerprint image captured through poor scanners, are found to have fewer number of minutiae points. The secretions in
the fingerprints contain various chemicals and their metabolites which can be detected and used for the forensic purposes
(Maio and D.Maltoni).
Automatic fingerprint authentication systems can be broadly classified into two categories [13].
1. Pattern (Image) based systems.
2. Minutiae based systems.
Literature Review Of Pattern / Image Based Fingerprint Authentication Systems.
Different authors have proposed different solutions to the problems of Pattern / Image Based Fingerprint Authentication
Systems.
1. Bazen et al. (A. M. Bazen and S. H. Gerez, 2000] proposed a 3- step correlation-based fingerprint verification system.
Step 1: Firstly, small sized templates are selected in the primary reference fingerprint.
Step 2: Then using the technique of template matching, the query (secondary) fingerprint is found. The secondary
fingerprint is the one to which the template matches the most.
Step 3: To authenticate fingerprint matching, comparing template position in both the fingerprints is done. If the template
position in both the primary and secondary fingerprint is same, the fingerprints are authenticated, else the case is opposite.
Advantage:
i) More stable than methods where correlation is computed globally. In this method, correlation is computed locally as
small templates are selected.
ii) Can tolerate the non-uniform local shape distortions in the fingerprint.
Dis-Advantage:
i) Computationally more expensive.
ii) Not able to deal with rotations of more than 10 degree.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 158
Paper Publications
2. Nandkumar et al. [K. Nandakumar and A. K. Jain,2004] proposed a local correlation-based fingerprint matching
algorithm. In this algorithm, two different window sizes are used. One window is used for the minutia locations in the
template image with window size of 42*42 pixels and another is used for the corresponding location in the query
(secondary) image with window size of 32*32 pixels. The peak is detected by calculating the normalized cross-correlation
between the query (secondary) window and the template window. All the possible correspondence from the alignment
stage are tested and maximum correlation value over all the correspondence is taken as the matching score between the
query and template image.
Case i): If the distance between the peak and center is more than 10 pixels, the correlation between the template and
query (secondary) window is zero.
Case ii): If the distance between the peak and center is less than 10 pixels, then there is an absolute value of correlation
between the query and template window. In all template windows, the local correlation with their corresponding regions
in the query (secondary) images are found and their mean correlation is calculated.
Advantage:
i) More stable than methods where correlation is computed globally.
Dis-Advantage:
i) All minutiae points are to be extracted so that all the related problems remain in the system database.
ii) Proper alignment algorithm is used before matching.
iii) System is computationally expensive.
3. Owang et al. [Z. Ouyang, J. Feng, F. Su and A. Cai, 2006. ] proposed a correlation-based matching method using two
functions i.e. Fourier- Mellin descriptor (FMD) and phase only correlation (POC). Most likely FMD pair is calculated
from the pair images and then the two fingerprints are aligned and other corresponding FMD pairs are checked if they are
matched or not. For the calculation of similarity of two FMDs and the alignment parameters, the POC function is used.
Advantage:
i) Is fast.
ii) Does not require any minutiae or core information while taking rotation into account. .
Dis-Advantage:
i) Computationally more expensive.
ii) Requires efficient method for the extraction of local FMDs to improve the performance of the system.
4. Cavusoglu et al. (A.Cavusoglu and S. Gorgunoglu, 2007) proposed a robust correlation-based fingerprint matching
algorithm. Before the application of correlation, the steps followed in the algorithm requires segmentation, ridge
orientation, reference point detection and normalized operation algorithm. In the enrollment stage, a set of features,
starting from the core, are obtained with different radius (r) and with different angles (θ). The set of features are obtained
by rotating the query image. For each rotation, the normalized cross correlation values of both the template and the query
images are calculated. Higher the value of cross correlation, higher is the similarity between the query and template
image.
Advantage:
i) Is efficient in terms of storage as only a set of features of template image are stored instead of the whole template
image.
Dis-Advantage:
i) Requires the accurate detection of core point.
ii) The method may fail in case the core is not present in the image.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 159
Paper Publications
Literature Review Of Minutiae-Based Fingerprint Systems:
Generally there are 2 steps involved in fingerprint matching algorithms, first to align the fingerprints and then find the
correspondences between the two. The various matching algorithms already given include:
1. Jain et.al [Jain A.K., Hong l., Pankati S., Bolle R,1997] : the algorithm given by Jain et.al is capable of compensating
for some of the non-linear deformations and then finding the correspondences. The problem with the technique is that for
accurate alignment; size of the image should be large, which takes much memory and computation.
2. Kovacs-Vajna [Kovacs-Vajna Z.M., 2000] : uses a triangular matching algorithm to deal with the deformations of
fingerprints. However, the main drawback of this technique is that without further verification the final results of this
matching algorithm are not acceptable.
3. Jiang and Yau [Jiang X., Yau W.Y., 2000 ] use both the local as well as global structures of minutiae in which the
local structure of a minutiae are used to describe the rotation and translation invariant feature of the minutiae in its
neighborhood, while as global structure define the uniqueness of fingerprint. The main drawback in this technique is that it
can’t be used to compensate for real world distortions of a 3D elastic finger.
3. SUMMARY
The notable strengths of fingerprint recognition include:
o It provides a high level of recognition accuracy.
o User friendly as it doesn’t require complex user-system interaction.
o Due to its small interface can be used in a broad range of applications , such as E-Commerce, PC’s and mobile login.
Some of most common CHALLENGES faced while dealing with fingerprint biometric authentication include:
o Low quality of input (primary) images,
o Data security issues related with fingerprint systems,
o It is not yet proved that fingerprints are unique and families don’t share elements of the same pattern,
o It is difficult to scan fingerprints of the elderly person as their skin loses elasticity and in some rare conditions can also
leave some people with smooth, featureless fingertips.
o Small-area sensors embedded in portable devices may result in less information available from a fingerprint.
REFERENCES
[1] Joao De Barros, Biometric history, August, 2005
[2] E. Spinella, “Biometrics Scanning Technologies: Finger, Facial and Retinal Scanning”, SANS Technology Institute,
San Francisco, Dec., 2002. 3. D.;
[3] Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol.19, no.1
[4] Pillay, V.V. Textbook of Forensic Medicine and Toxicology. 15th ed. Hyderabad: Paras Medical Publishers, 2009:
53-94.
[5] Kanchan, T. Chattopadhyay, S. Distribution of Fingerprint Patterns among Medical Students. Journal of Indian
Acade-my of Forensic Medicine, 2006; 28(2): 65-68. ]
[6] A.K. Jain, P. Flynn, & A.A Ross; Handbook of Biometrics; Springer, Secaucus, NJ, USA, 2007.
[7] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892.
[8] D. Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol.19, no.1, pp. 27-40, 1997.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 160
Paper Publications
[9] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892
[10] Neil Yager and Adnan Amin; Fingerprint verification based on minutiae features: A review Pattern Analysis and
Application, 7:94-113, February 2004
[11] L. Hong, Y. Wan, A. Jain, Fingerprint image enhancement: Algorithm and performance evaluation, IEEE Trans.
Pattern Anal. Mach. Intell. (1998) 777– 789
[12] C. Khmanee, D. Nguyen, On the design of 2D Gabor filtering of fingerprint images, in: First IEEE Consumer
Communications and Networking Conference, CCNC 2004, 2004, pp. 430–435
[13] P. Reid, “Biometric for Network Security”,1st Indian Reprint, Pearson Education, New Delhi, 2004.
[14] A. M. Bazen and S. H. Gerez, “Directional Field Computation for Fingerprints based on the Principal Component
Analysis of Local Gradients”, Proceedings of 11th Annual Workshopon Circuits, Systems and Signal Processing,
Veldhoven, Netherlands, pp. 1-7, November, 2000.
[15] K. Nandakumar and A. K. Jain, “Local Correlation-based Fingerprint Matching”, Proceedings of Indian Conference
on Computer Vision, Graphics & Image Processing, pp.1-6, Kolkata, December, 2004
[16] A. Cavusoglu and S. Gorgunoglu, “A Robust Correlation based Fingerprint Matching Algorithm for Verification”,
Journal of Applied Sciences, vol. 7, no. 21, pp. 3286-3291, 2007
[17] Z. Ouyang, J. Feng, F. Su and A. Cai, “Fingerprint Matching with Rotation Descriptor Texture Features”,
Proceedings of 18th International Conference on Pattern Recognition, Hong Kong, vol. 4, pp. 417-420, Aug., 2006
[18] S Pankati, S.Prabhakar, Jain A.K. “On the indiviaduality of Fingerprints.” Pattern Analysis And Machine
Intelligence,IEEE Tranactions on 24, no.8(2002) :1010-1025.
[19] Jain A.K., Hong l., Pankati S., Bolle R.,An Identity-authentication system using fingerprints, Proc.IEEE 85(9)
pp:1364-1388,1997
[20] Kovacs-Vajna Z.M., A Fingerprint verification system based on triangular matching and dynamic time warping,
IEEE Trans. Pattern Anal. Mach. Intel.22(11):1266-1276,2000
[21] Jiang X., Yau W.Y., Fingerprint minutiae matching based on the local and global structures, Proceeding of the
International Conference on Pattern Recognition, pp. 1030-1041, 2000

More Related Content

What's hot

An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
 
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Sana Fakhfakh
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionSana Fakhfakh
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
 
Gesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageGesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageIRJET Journal
 
Face recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisFace recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisacijjournal
 
Reducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification SystemReducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification SystemCSCJournals
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameterijtsrd
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemIJTET Journal
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
 

What's hot (20)

Palmprint Identification Using FRIT
Palmprint Identification Using FRITPalmprint Identification Using FRIT
Palmprint Identification Using FRIT
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
 
Paper
PaperPaper
Paper
 
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognition
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
 
Gesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageGesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign Language
 
finger prints
finger printsfinger prints
finger prints
 
Face recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisFace recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysis
 
Reducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification SystemReducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification System
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Og3424882497
Og3424882497Og3424882497
Og3424882497
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
 
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 

Viewers also liked

Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc NetworkEfficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Networkpaperpublications3
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
Analysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing TechniquesAnalysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing Techniquespaperpublications3
 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Datapaperpublications3
 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...paperpublications3
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancerpaperpublications3
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networkspaperpublications3
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Some Aspects of Abelian Categories
Some Aspects of Abelian CategoriesSome Aspects of Abelian Categories
Some Aspects of Abelian Categoriespaperpublications3
 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysispaperpublications3
 
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...paperpublications3
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
Multimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone EnergyMultimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone Energypaperpublications3
 
Android Application for College
Android Application for CollegeAndroid Application for College
Android Application for Collegepaperpublications3
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstractionpaperpublications3
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environmentpaperpublications3
 

Viewers also liked (20)

Diabetics Online
Diabetics OnlineDiabetics Online
Diabetics Online
 
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc NetworkEfficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Analysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing TechniquesAnalysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing Techniques
 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Data
 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancer
 
Automatic Fire Fighting Robot
Automatic Fire Fighting RobotAutomatic Fire Fighting Robot
Automatic Fire Fighting Robot
 
Fuzzy α^m-Separation Axioms
Fuzzy α^m-Separation AxiomsFuzzy α^m-Separation Axioms
Fuzzy α^m-Separation Axioms
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
 
Smart Password
Smart PasswordSmart Password
Smart Password
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Some Aspects of Abelian Categories
Some Aspects of Abelian CategoriesSome Aspects of Abelian Categories
Some Aspects of Abelian Categories
 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysis
 
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
Multimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone EnergyMultimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone Energy
 
Android Application for College
Android Application for CollegeAndroid Application for College
Android Application for College
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
 

Similar to Fingerprint Feature Extraction, Identification and Authentication: A Review

novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace SystemAgbona Azeez
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint IdentificationIJMER
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysisvivatechijri
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd Iaetsd
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...IJTET Journal
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGSshiv dhori
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET Journal
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint AnalaysisANIKLAL2
 

Similar to Fingerprint Feature Extraction, Identification and Authentication: A Review (20)

novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matching
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
 
L026070074
L026070074L026070074
L026070074
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGS
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Fingerprint Feature Extraction, Identification and Authentication: A Review

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 156 Paper Publications Fingerprint Feature Extraction, Identification and Authentication: A Review 1 Farah Fayaz Quraishi, 2 Summera Ashraf, 3 Dr. Manzoor Ahmad Chachoo 1, 2, 3 Department of Computer Science, University of Kashmir, Srinagar, Kashmir -190006, India Abstract: In the modern computerized world, due to high demand on fingerprint identification system, a lot of challenges keep arising in each phase of system, which include fingerprint image enhancement, feature extraction, features matching and fingerprint classification. Applications such as online banking and online shopping use techniques that depend on personal identification numbers, keys, or passwords. But there is the risk of data being forgotten, lost, or even stolen. One of the solutions to it may be biometric authentication methods which provide a unique way to identify, recognize and authenticate people. Fingerprints being the oldest methods of biometric authentication, are being explored at large. The main focus of the paper is to review fingerprint feature extraction, identification and authentication in different image/pattern based and minutiae-based fingerprints. Keywords: Fingerprints, identification, feature extraction, authentication, AFIS. 1. INTRODUCTION Fingerprint identification, also referred as “DACTYLOSCOPY”, is the method of verifying the fingerprints by comparing two instances of minutiae which can be extracted from human fingers, toes, or even the palm of the hand or sole of the foot. Fingerprint is one of the most researched and matured field of biometric authentication. The first known example of biometrics in practice was a form of fingerprinting being used in China (Joao De Barros, 2005). Fingerprints offer a flawless and reliable means of personal identification, thereby, replacing other methods of establishing identities and authentication. The science of fingerprint identification and authentication outshines all other forensic sciences on the following grounds (E. Spinella, 2002): 1) Fingerprint details are permanent. Other visible human characteristics tend to change – fingerprints don’t. Although with age as the skin loses elasticity, fingerprints seem to be changed. 2) No two fingerprints have been ever found alike in many billions of humans and automated computer comparisons, although individuality has been recently challenged in many court cases. According to the empirical study, two individuals will not have more than seven common minutiae (E. Spinella, 2002, Maio and D. Maltoni) Fingerprint Features Usually Considered: 1) Coarse Features: also known by the name of singular-points, are suited during an identification for presorting in a very large database and include:  Arch: These ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of finger.  Loop: The ridges enter from one side of a finger, form a curve, and then exit on the same side.  Whorl: Ridges form circularly around a central point on the finger.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 157 Paper Publications 2) Fine Features: The major minutia features of fingerprint ridges are:  Ridge Ending: point at which ridge terminates.  Bifurcation: point at which single ridge splits into two ridges.  Short Ridge (Or Dot): are ridges which are significantly shorter than the average ridge length on fingerprint.  Core-Point: is the top-most point on the inner most ridge.  Delta-Point: is the tri-radial point with three ridges radiating. To identify and authenticate fingerprints, two steps are involved: Classification and Matching. Classification is the method of grouping fingerprints into a few types based on a criteria while fingerprint matching is a method that uses some sort of algorithm to assign the fingerprint to a particular person it belongs to, that is found in the database.. 2. BACKGROUND Fingerprints are constant, unique and form the most reliable criteria for identification (Pillay, 2009; Kanchan, T. Chattopadhyay, S., 2006). It has been shown that fingerprints provide high accuracy when compared with other existing biometric traits (A.K. Jain, P. Flynn, & A.A Ross; 2007). They are persistent in nature as they don’t easily change with age, unlike face and voice patterns. Fingerprints are incomparably the most sure and unchanging form of all other forms of signature (Francis Galton, 1892). According to Dario Maio and Davide Maltoni, “fingerprints are defined by a set of ridge lines and they can run parallel, can terminate sometimes or can even intersect each other and the points where the ridge lines are terminated, are known as Minutiae (D.Maio and D.Maltoni, 1997).” According to Galton, “each ridge is characterized by numerous minute peculiarities called Minutiae, which may divide and almost immediately reunite, enclosing a small circular or elliptical space or sometimes the independent beginning or ending of ridges (Francis Galton, 1892)”. In a fingerprint image, ridges are dark whereas valleys are bright. Ridges and valleys often run in parallel; sometimes they bifurcate and sometimes they terminate. A good quality fingerprint contains 25-80 numbers of minutiae (Neil Yager and Adnan Amin, 2004) which depend on the resolution and finger placement on the sensor. However, the fingerprint image captured through poor scanners, are found to have fewer number of minutiae points. The secretions in the fingerprints contain various chemicals and their metabolites which can be detected and used for the forensic purposes (Maio and D.Maltoni). Automatic fingerprint authentication systems can be broadly classified into two categories [13]. 1. Pattern (Image) based systems. 2. Minutiae based systems. Literature Review Of Pattern / Image Based Fingerprint Authentication Systems. Different authors have proposed different solutions to the problems of Pattern / Image Based Fingerprint Authentication Systems. 1. Bazen et al. (A. M. Bazen and S. H. Gerez, 2000] proposed a 3- step correlation-based fingerprint verification system. Step 1: Firstly, small sized templates are selected in the primary reference fingerprint. Step 2: Then using the technique of template matching, the query (secondary) fingerprint is found. The secondary fingerprint is the one to which the template matches the most. Step 3: To authenticate fingerprint matching, comparing template position in both the fingerprints is done. If the template position in both the primary and secondary fingerprint is same, the fingerprints are authenticated, else the case is opposite. Advantage: i) More stable than methods where correlation is computed globally. In this method, correlation is computed locally as small templates are selected. ii) Can tolerate the non-uniform local shape distortions in the fingerprint. Dis-Advantage: i) Computationally more expensive. ii) Not able to deal with rotations of more than 10 degree.
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 158 Paper Publications 2. Nandkumar et al. [K. Nandakumar and A. K. Jain,2004] proposed a local correlation-based fingerprint matching algorithm. In this algorithm, two different window sizes are used. One window is used for the minutia locations in the template image with window size of 42*42 pixels and another is used for the corresponding location in the query (secondary) image with window size of 32*32 pixels. The peak is detected by calculating the normalized cross-correlation between the query (secondary) window and the template window. All the possible correspondence from the alignment stage are tested and maximum correlation value over all the correspondence is taken as the matching score between the query and template image. Case i): If the distance between the peak and center is more than 10 pixels, the correlation between the template and query (secondary) window is zero. Case ii): If the distance between the peak and center is less than 10 pixels, then there is an absolute value of correlation between the query and template window. In all template windows, the local correlation with their corresponding regions in the query (secondary) images are found and their mean correlation is calculated. Advantage: i) More stable than methods where correlation is computed globally. Dis-Advantage: i) All minutiae points are to be extracted so that all the related problems remain in the system database. ii) Proper alignment algorithm is used before matching. iii) System is computationally expensive. 3. Owang et al. [Z. Ouyang, J. Feng, F. Su and A. Cai, 2006. ] proposed a correlation-based matching method using two functions i.e. Fourier- Mellin descriptor (FMD) and phase only correlation (POC). Most likely FMD pair is calculated from the pair images and then the two fingerprints are aligned and other corresponding FMD pairs are checked if they are matched or not. For the calculation of similarity of two FMDs and the alignment parameters, the POC function is used. Advantage: i) Is fast. ii) Does not require any minutiae or core information while taking rotation into account. . Dis-Advantage: i) Computationally more expensive. ii) Requires efficient method for the extraction of local FMDs to improve the performance of the system. 4. Cavusoglu et al. (A.Cavusoglu and S. Gorgunoglu, 2007) proposed a robust correlation-based fingerprint matching algorithm. Before the application of correlation, the steps followed in the algorithm requires segmentation, ridge orientation, reference point detection and normalized operation algorithm. In the enrollment stage, a set of features, starting from the core, are obtained with different radius (r) and with different angles (θ). The set of features are obtained by rotating the query image. For each rotation, the normalized cross correlation values of both the template and the query images are calculated. Higher the value of cross correlation, higher is the similarity between the query and template image. Advantage: i) Is efficient in terms of storage as only a set of features of template image are stored instead of the whole template image. Dis-Advantage: i) Requires the accurate detection of core point. ii) The method may fail in case the core is not present in the image.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 159 Paper Publications Literature Review Of Minutiae-Based Fingerprint Systems: Generally there are 2 steps involved in fingerprint matching algorithms, first to align the fingerprints and then find the correspondences between the two. The various matching algorithms already given include: 1. Jain et.al [Jain A.K., Hong l., Pankati S., Bolle R,1997] : the algorithm given by Jain et.al is capable of compensating for some of the non-linear deformations and then finding the correspondences. The problem with the technique is that for accurate alignment; size of the image should be large, which takes much memory and computation. 2. Kovacs-Vajna [Kovacs-Vajna Z.M., 2000] : uses a triangular matching algorithm to deal with the deformations of fingerprints. However, the main drawback of this technique is that without further verification the final results of this matching algorithm are not acceptable. 3. Jiang and Yau [Jiang X., Yau W.Y., 2000 ] use both the local as well as global structures of minutiae in which the local structure of a minutiae are used to describe the rotation and translation invariant feature of the minutiae in its neighborhood, while as global structure define the uniqueness of fingerprint. The main drawback in this technique is that it can’t be used to compensate for real world distortions of a 3D elastic finger. 3. SUMMARY The notable strengths of fingerprint recognition include: o It provides a high level of recognition accuracy. o User friendly as it doesn’t require complex user-system interaction. o Due to its small interface can be used in a broad range of applications , such as E-Commerce, PC’s and mobile login. Some of most common CHALLENGES faced while dealing with fingerprint biometric authentication include: o Low quality of input (primary) images, o Data security issues related with fingerprint systems, o It is not yet proved that fingerprints are unique and families don’t share elements of the same pattern, o It is difficult to scan fingerprints of the elderly person as their skin loses elasticity and in some rare conditions can also leave some people with smooth, featureless fingertips. o Small-area sensors embedded in portable devices may result in less information available from a fingerprint. REFERENCES [1] Joao De Barros, Biometric history, August, 2005 [2] E. Spinella, “Biometrics Scanning Technologies: Finger, Facial and Retinal Scanning”, SANS Technology Institute, San Francisco, Dec., 2002. 3. D.; [3] Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.19, no.1 [4] Pillay, V.V. Textbook of Forensic Medicine and Toxicology. 15th ed. Hyderabad: Paras Medical Publishers, 2009: 53-94. [5] Kanchan, T. Chattopadhyay, S. Distribution of Fingerprint Patterns among Medical Students. Journal of Indian Acade-my of Forensic Medicine, 2006; 28(2): 65-68. ] [6] A.K. Jain, P. Flynn, & A.A Ross; Handbook of Biometrics; Springer, Secaucus, NJ, USA, 2007. [7] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892. [8] D. Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.19, no.1, pp. 27-40, 1997.
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 160 Paper Publications [9] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892 [10] Neil Yager and Adnan Amin; Fingerprint verification based on minutiae features: A review Pattern Analysis and Application, 7:94-113, February 2004 [11] L. Hong, Y. Wan, A. Jain, Fingerprint image enhancement: Algorithm and performance evaluation, IEEE Trans. Pattern Anal. Mach. Intell. (1998) 777– 789 [12] C. Khmanee, D. Nguyen, On the design of 2D Gabor filtering of fingerprint images, in: First IEEE Consumer Communications and Networking Conference, CCNC 2004, 2004, pp. 430–435 [13] P. Reid, “Biometric for Network Security”,1st Indian Reprint, Pearson Education, New Delhi, 2004. [14] A. M. Bazen and S. H. Gerez, “Directional Field Computation for Fingerprints based on the Principal Component Analysis of Local Gradients”, Proceedings of 11th Annual Workshopon Circuits, Systems and Signal Processing, Veldhoven, Netherlands, pp. 1-7, November, 2000. [15] K. Nandakumar and A. K. Jain, “Local Correlation-based Fingerprint Matching”, Proceedings of Indian Conference on Computer Vision, Graphics & Image Processing, pp.1-6, Kolkata, December, 2004 [16] A. Cavusoglu and S. Gorgunoglu, “A Robust Correlation based Fingerprint Matching Algorithm for Verification”, Journal of Applied Sciences, vol. 7, no. 21, pp. 3286-3291, 2007 [17] Z. Ouyang, J. Feng, F. Su and A. Cai, “Fingerprint Matching with Rotation Descriptor Texture Features”, Proceedings of 18th International Conference on Pattern Recognition, Hong Kong, vol. 4, pp. 417-420, Aug., 2006 [18] S Pankati, S.Prabhakar, Jain A.K. “On the indiviaduality of Fingerprints.” Pattern Analysis And Machine Intelligence,IEEE Tranactions on 24, no.8(2002) :1010-1025. [19] Jain A.K., Hong l., Pankati S., Bolle R.,An Identity-authentication system using fingerprints, Proc.IEEE 85(9) pp:1364-1388,1997 [20] Kovacs-Vajna Z.M., A Fingerprint verification system based on triangular matching and dynamic time warping, IEEE Trans. Pattern Anal. Mach. Intel.22(11):1266-1276,2000 [21] Jiang X., Yau W.Y., Fingerprint minutiae matching based on the local and global structures, Proceeding of the International Conference on Pattern Recognition, pp. 1030-1041, 2000